Lucene search

K
suseSuseOPENSUSE-SU-2020:1017-1
HistoryJul 20, 2020 - 12:00 a.m.

Security update for MozillaFirefox (important)

2020-07-2000:00:00
lists.opensuse.org
35

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

An update that fixes 13 vulnerabilities is now available.

Description:

This update for MozillaFirefox to version 78.0.1 ESR fixes the following
issues:

Security issues fixed:

  • CVE-2020-12415: AppCache manifest poisoning due to url encoded character
    processing (bsc#1173576).
  • CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
  • CVE-2020-12417: Memory corruption due to missing sign-extension for
    ValueTags on ARM64 (bsc#1173576).
  • CVE-2020-12418: Information disclosure due to manipulated URL object
    (bsc#1173576).
  • CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
  • CVE-2020-12420: Use-After-Free when trying to connect to a STUN server
    (bsc#1173576).
  • CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack
    (bsc#1173576).
  • CVE-2020-12421: Add-On updates did not respect the same certificate
    trust rules as software updates (bsc#1173576).
  • CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer
    (bsc#1173576).
  • CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library
    (bsc#1173576).
  • CVE-2020-12424: WebRTC permission prompt could have been bypassed by a
    compromised content process (bsc#1173576).
  • CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
  • CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
  • FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

  • Fixed interaction with freetype6 (bsc#1173613).

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2020-1017=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C